deploy-react-frontend
Audited by Gen Agent Trust Hub on Feb 12, 2026
================================================================================
🔵 VERDICT: LOW
This skill is primarily instructional, guiding users on how to build React frontends for Algorand dApps. The main security consideration is the instruction to install several external npm packages. While these are standard and well-known within the Algorand development ecosystem (e.g., @algorandfoundation, @txnlab, algosdk, @perawallet, @blockshake), they are external dependencies. According to the 'Trusted External Sources' protocol, this type of dependency is downgraded to LOW/INFO severity as the sources are considered reputable in their domain. No other critical security threats such as prompt injection, data exfiltration, privilege escalation, or persistence mechanisms were detected in the skill's instructions or code examples.
Total Findings: 2
🔵 LOW Findings: • Unverifiable Dependencies
- Line 36 (SKILL.md): The skill instructs
npm installfor several external packages:@algorandfoundation/algokit-utils,@txnlab/use-wallet-react,algosdk,@perawallet/connect,@blockshake/defly-connect,@agoralabs-sh/avm-web-provider,lute-connect. While these are external dependencies, they are standard and well-known within the Algorand ecosystem and are from reputable organizations. This finding is downgraded to LOW severity as per the 'Trusted External Sources' rule.
ℹ️ TRUSTED SOURCE References: • External Dependencies
- Line 36 (SKILL.md): The skill instructs
npm installfor several external packages. These packages are from well-known and reputable organizations within the Algorand ecosystem (e.g., @algorandfoundation, @txnlab, @perawallet, @blockshake, algosdk). This is noted as an informational finding, and its severity is downgraded due to the trusted nature of the sources. • Indirect Prompt Injection Risk - Line 1 (SKILL.md): The skill involves generating code from an
app specfile (MyContract.arc56.json) and processing user input in the React frontend. If theapp specfile or user input were to contain malicious instructions, it could lead to indirect prompt injection. This is a general risk inherent in applications that process external data or user-provided configurations, rather than a direct vulnerability introduced by the skill itself. This is an informational warning about a potential risk vector.
================================================================================